shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆152Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- ☆520Updated 8 months ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆459Updated 3 years ago
- Hash identification program.☆154Updated 3 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆114Updated last year
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- A targeted DNS cache poisoner☆123Updated 3 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆301Updated 5 years ago
- Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk☆40Updated 4 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆66Updated 4 years ago
- Bluesniff☆86Updated 10 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆79Updated 5 years ago
- A tool for processing a lot of pcaps using tshark☆153Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Open Source Arduino Program for Keystroke Reflection Side Channel Attack☆46Updated 3 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆72Updated 2 years ago
- A pure Python script to easily get a reverse shell☆51Updated 2 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆186Updated 3 years ago
- 🌠 The World's Fastest StegCracker 🌠☆28Updated 5 years ago
- ☆230Updated 2 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆302Updated 6 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or …☆288Updated last year
- ☆80Updated last year
- A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers…☆289Updated last year
- A5/1 Decryption☆119Updated 6 years ago
- List of the tools and usage☆232Updated 3 months ago
- ☆59Updated last year